Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

Connect with us

Hi, what are you looking for?

slide 3 of 2
THE BIZNOB – Global Business & Financial News – A Business Journal – Focus On Business Leaders, Technology – Enterpeneurship – Finance – Economy – Politics & LifestyleTHE BIZNOB – Global Business & Financial News – A Business Journal – Focus On Business Leaders, Technology – Enterpeneurship – Finance – Economy – Politics & Lifestyle

Security

Security

Cybersecurity the Factors Behind Varied Impact of Cyber-Attacks

Cybersecurity the Factors Behind Varied Impact of Cyber-Attacks
Cybersecurity the Factors Behind Varied Impact of Cyber-Attacks

Listen to the article now

Cybersecurity The Factors Behind Varied Impact of Cyber-Attacks

The British Library, once a haven for writers, is grappling with the aftermath of a ransomware attack that occurred in October 2023. The Russian hacker group Rhysida claimed responsibility and demanded a ransom of 20 bitcoins (£600,000), which the library refused to pay. After an online auction of stolen data, the hackers leaked nearly 600 GB of private information on the dark web. The recovery process has been prolonged, and the library is expected to take several months, if not a year, to fully analyze and recover from the cyber-attack.

The attack has affected the library’s online catalog, making it inaccessible for an extended period. While downtime following a ransomware attack in the US averaged 24 days from 2020 to mid-2022, the British Library’s recovery time is unusually long. External observers suggest that the comprehensive analysis of leaked data and the library’s specific circumstances contribute to this extended recovery period.

Organizations facing cyber-attacks often grapple with challenges such as identifying affected systems, decrypting servers, uninstalling non-functional applications, blocking connections, disabling accounts, and restoring uninfected backups. The extent of rebuilding or constructing new systems also influences the recovery timeline. The Scottish Environment Protection Agency (SEPA), which experienced a ransomware attack in December 2020, chose to build new systems rather than re-establish legacy ones, reflecting a commitment to resilience.

Various factors contribute to the duration of cyber-attack recovery, including the number and type of affected systems, the quality of backups, the expertise of IT staff, and the sophistication of the attack and initial response. Trends like the rise of cloud computing introduce new challenges, such as attackers encrypting hypervisors, impacting multiple systems simultaneously.

Organizations are urged to prioritize frequent backup creation and testing to enhance resilience against cyber attacks. Diversity in cybersecurity prevention measures is also crucial, as a reliance on a single type of prevention, like antivirus software, can prove ineffective. Investing in cybersecurity staff and tools, testing cybersecurity products in the organization’s environment, and securing cyber-risk insurance are recommended strategies to bolster defenses.

Despite preparedness efforts, cyber-attacks remain a persistent threat, and financial losses from disrupted operations often exceed the initial ransom demand. The British Library, facing millions of pounds in digital rebuilding costs, highlights the importance of cyber-risk insurance as a component of organizations’ broader risk plans. As the frequency and sophistication of cyber-attacks continue to evolve, organizations must remain vigilant and adaptive in their cybersecurity strategies.


Comment Template

You May Also Like

Politics

Senator Ron Wyden Blocks Nomination Over Telecom Security Concerns Democratic Senator Ron Wyden has placed a hold on the nomination of Sean Plankey to...

Security

Hackers Strike Back: Everest Ransomware Gang’s Leak Site Defaced A recent cyber twist has unfolded as the leak site used by the notorious Everest...

Finances

One gathering is changing cash destiny in a quickly computerized society. Fire blocks, the inventive tech organization disturbing robotized finance Because of its creative...

Security

Cybersecurity Concerns: Chinese Tech Company Allegedly Asserts Leaked documents have surfaced, suggesting that a Chinese cybersecurity firm, i-Soon, asserted its capability to hack the...

Notice: The Biznob uses cookies to provide necessary website functionality, improve your experience and analyze our traffic. By using our website, you agree to our Privacy Policy and our Cookie Policy.

Ok